Subido por Norberto Perna

Flows Customer Deck

Anuncio
Orchestrate and Automate Identity Without Coding
Microsoft
Azure
VMs
IoT
App Server
Database
Office
Copyright © 2022 CyberArk Software Ltd. All rights reserved.
Office 365
IT Ops Tool
Salesforce
Network Devices
Admin
Work from
Home
Google
Cloud
DevOps
Temporary
Location
Zoom
Apps/Machine
Cloud Native
Apps
G Suite
3rd Party
Containers
Amazon
VM’s &
Storage
Serverless
Workforce
Mac
PC
Mobile
cyberark.com
2
Companies now use an average of 976
applications, and only 28% of these are integrated 1
45%
of organizations see application integration as
one of their top challenges 2
3
1 MuleSoft
2
and Deloitte, Connectivity Benchmark Report, 2022
Deloitte, Global Chief Procurement Officer Survey, 2021
cyberark.com
Opportunities for risk
Lack of control
Loss of productivity
High cost
4
Copyright © 2022 CyberArk Software Ltd. All rights reserved.
cyberark.com
Security, efficiency, productivity and data
confidence through the automation of identity
data, processes and events
Copyright © 2022 CyberArk Software Ltd. All rights reserved.
cyberark.com
Quickly reduce complexity and eliminate manual tasks with flexible workflows
Orchestrate Identity data, processes,
tasks and events across the enterprise
APPLICATION INTEGRATION
NO-CODE VISUAL EDITOR
Build custom connections quickly and
easily with thousands of pre-built
connectors
Use an intuitive user interface to
visualize your workflow and drag and
drop elements, no coding needed
AUTOMATION
DYNAMIC WORKFLOWS
Automate complex business process
and connect data into workflows
quickly and easily
Allow end-users to initiate workflows
and create dynamic workflows for
events requiring user action
cyberark.com
Integrate
applications
Leverage thousands of prebuilt connectors and keep all
your apps working together
as one.
7
cyberark.com
Automate Business
Processes
Automate identity management
tasks through no-code
app integrations and workflows for
identity data, processes and
events.
8
cyberark.com
Create Dynamic
Workflows
Use conditional logic to create
custom, flexible workflows that
adapt and change based on
events or triggers.
9
cyberark.com
Build Without
Coding
The Flows no-code/low-code
visual editor allows anyone to
build and execute workflows,
orchestrating identity
management by dragging and
dropping or selecting from prebuilt templates.
10
cyberark.com
What You Can Do
With Flows
11
cyberark.com
Automation makes identity lifecycle management possible in any app
cyberark.com
Use external service events and posture to influence access to resources for identities
cyberark.com
Leverage Flows to automate and orchestrate complex business processes to save time and improve operational
efficiencies
Present form to
collect PAM
login info
Service account is created
by Flows in Active Directory
through CyberArk Identity
and accounts are linked to
correct Safes
Flows
Retrieves user
authentication
Token from
CyberArk Identity
Flows creates
request in Slack
asking Admin to
approve
Get list of existing
PAM Safes for user
to select from in
next step
Flows provides end user
with form to collect
service account details
cyberark.com
• Schedule a personalized
demo
• Visit
CyberArk.com/products/ide
ntity-flows to learn more
https://www.cyberark.com/try-buy/cloud-entitlements-manager/
cyberark.com
15
Thank You
16
cyberark.com
Identities
Resources
Identity Security Platform
Admins
Applications &
Services
Seamless & Secure
Access for
All Identities
Workforce
Intelligent
Privilege
Controls
Flexible Identity
Automation &
Orchestration
Infrastructure &
Endpoints
CyberArk Identity Flows
Third Parties
Workforce &
Customer
Access
Customers
DevOps
Endpoint
Privilege
Security
Privileged
Access
Management
Cloud
CyberArk Secrets
Flows is an identityPrivilege
Management
Security
orchestration tool that automates
identity management tasks through
no-code app integrations and
workflows for identity data, processes,
and events.
Data
Identity
Management
Environments
Data Centers
OT
Identity Security Intelligence
Workloads
Shared
Services
Devices
Hybrid & Multi-Cloud
Single Admin Portal | Workflows | Unified Audit | Authentication & Authorization
SaaS
SaaS | Hybrid | Self-Hosted
cyberark.com
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP APP
APP
APP
APP
APP
APP
APP
APP
IoT
IT Ops Tool
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
Microsoft
Azure
APP
APP
Google
Cloud
APP
Office 365
Amazon
APP
APP
Salesforce
Network Devices
APP
APP
APP
APP
Database
APP
APP
APP
APP
App Server
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
VMs
APP
APP
APP
APP
APP APP
APP APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
APP
Zoom
Cloud Native
Apps
G Suite
Containers
VM’s &
Storage
Serverless
APP
APP
Admin
Office
Copyright © 2022 CyberArk Software Ltd. All rights reserved.
Work from
Home
DevOps
Temporary
Location
Apps/Machine
3rd Party
Workforce
Mac
PC
Mobile
cyberark.com
18
Descargar